A security device may receive, from a client device, a request associated with a server device. The security device may determine a communication channel and contact information for validating the request. The security device may provide validation information via the communication channel using the contact information. The security device may receive a validation response from the client device, and may determine whether the validation response is valid. The security device may selectively perform a first action or a second action based on determining whether the validation response is valid. The first action may be performed based on determining that the validation response is valid, and may include providing a validation indicator, with the request, to the server device. The second action may be performed based on determining that the validation response is not valid, and may include providing an invalidation indicator, with the request, to the server device.
|
1. A device, comprising:
a communication interface; and
one or more processors to:
receive, from a client device and via a first communication channel, a first request associated with a server device,
the first request requesting access to a first portion of a website;
determine a sensitivity level associated with the first request;
determine, based on the sensitivity level and based on the first request requesting access to the first portion of the website, a second communication channel for validating the first request,
the second communication channel being different from the first communication channel;
determine contact information for contacting a user, associated with the first request, via the second communication channel;
transmit, via the second communication channel and using the contact information, first validation information;
receive a first validation response from the client device;
determine, based on the first validation information and the first validation response, that the first validation response is valid;
grant access to the first portion of the website based on determining that the first validation response is valid;
receive a second request requesting access to a second portion of the website;
determine, based on the second request requesting access to the second portion of the website, a third communication channel for validating the second request,
the third communication channel being different from the first communication channel and the second communication channel;
transmit second validation information via the third communication channel;
receive a second validation response after transmitting the second validation information;
determine whether the second validation response is valid based on the second validation information and the second validation response; and
perform an action based on determining whether the second validation response is valid,
the action comprising:
granting access to the second portion of the website based on determining that the second validation response is valid, or
providing the second request and an invalidation indicator to the server device, via the third communication channel, based on determining that the second validation response is invalid,
 information identifying at least one of the client device or the user being included on a blacklist when validation fails a threshold quantity of times.
8. A non-transitory computer-readable medium storing instructions, the instructions comprising:
one or more instructions that, when executed by one or more processors, cause the one or more processors to:
receive, from a client device and via a first communication channel, a first request that identifies a server device as a destination for the first request,
the first request requesting access to a first portion of a website;
determine, based on a sensitivity level associated with the first request and based on the first request requesting access to the first portion of the website, a second communication channel for validating the first request,
the second communication channel being different from the first communication channel;
determine contact information for contacting a user, associated with the first request, via the second communication channel;
transmit, via the second communication channel and using the contact information, first validation information;
receive a first validation response from the client device after transmitting the first validation information;
determine, based on the first validation information and the first validation response, that the first validation response is valid;
grant access to the first portion of the website based on determining that the first validation response is valid;
receive a second request requesting access to a second portion of the website;
determine, based on the second request requesting access to the second portion of the website, a third communication channel for validating the second request,
the third communication channel being different from the first communication channel and the second communication channel;
transmit second validation information via the third communication channel;
receive a second validation response after transmitting the second validation information;
determine whether the second validation response is valid based on the second validation information and the second validation response; and
perform an action based on determining whether the second validation response is valid,
the action comprising:
granting access to the second portion of the website based on determining that the second validation response is valid, or
providing the second request and an invalidation indicator to the server device, via the third communication channel, based on determining that the second validation response is invalid.
14. A method, comprising:
receiving, by a security device and via a first communication channel, a first request by a first device to access a second device,
the first request requesting access to a first portion of a website;
determining, by the security device, a sensitivity level associated with the first request;
determining, by the security device, based on the sensitivity level, and based on the first request requesting access to the first portion of the website, at least one of:
a second communication channel for validating the first request,
the second communication channel being different from the first communication channel, or
contact information for contacting a user, associated with the first request, via the second communication channel;
transmitting, by the security device, first validation information via the second communication channel and using the contact information;
receiving, by the security device, a first validation response from the first device after transmitting the first validation information;
determining, by the security device, that the first validation response is valid based on the first validation information and the first validation response;
granting, by the security device, access to the first portion of the website based on determining that the first validation response is valid;
receiving, by the security device, a second request requesting access to a second portion of the website;
determining, by the security device and based on the second request requesting access to the second portion of the website, a third communication channel for validating the second request,
the third communication channel being different from the first communication channel and the second communication channel;
transmitting, by the security device, second validation information via the third communication channel;
receiving, by the security device, a second validation response after transmitting the second validation information;
determining, by the security device, whether the second validation response is valid based on the second validation information and the second validation response; and
performing, by the security device, an action based on determining whether the second validation response is valid,
the action comprising:
granting access to the second portion of the website based on determining that the second validation response is valid, or
providing the second request and an invalidation indicator to the second device, via the third communication channel, based on determining that the second validation response is invalid.
2. The device of
store the first request;
where the one or more processors, when determining whether the second validation response is valid, are to:
determine that the second validation response is valid; and
where the one or more processors, when performing the action, are to:
provide the first request and a validation indicator to the server device based on storing the first request and based on determining that the second validation response is valid,
the validation indicator indicating that that client device has been validated.
3. The device of
provide the validation indicator in a header of the first request.
4. The device of
receive, from the server device, a response to the first request; and
store the response to the first request before determining whether the second validation response is valid;
where the one or more processors, when determining whether the second validation response is valid, are to:
determine that the second validation response is valid; and
where the one or more processors, when performing the action, are to:
provide the second validation response to the client device based on determining that the second validation response is valid.
5. The device of
determine to validate the first request based on at least one of:
content included in the first request,
the client device,
the server device,
a webpage associated with the first request; and
where the one or more processors, when transmitting the first validation information, are to:
transmit the first validation information based on determining to validate the first request.
6. The device of
receive, from the server device, an indication to validate the first request; and
where the one or more processors, when transmitting the first validation information, are to:
transmit the first validation information based on receiving the indication to validate the first request.
7. The device of
determine the contact information based on information included in the first request.
9. The non-transitory computer-readable medium of
10. The non-transitory computer-readable medium of
determine that the second validation response is invalid; and
where the one or more instructions, when executed by the one or more processors, further cause the one or more processors to:
determine a quantity of times that validation has failed based on determining that the second validation response is invalid;
determine that the quantity of times is less than or equal to a threshold; and
transmit new validation information based on determining that the quantity of times is less than or equal to the threshold.
11. The non-transitory computer-readable medium of
determine that the second validation response is invalid; and
where the one or more instructions, when executed by the one or more processors, further cause the one or more processors to:
determine a quantity of times that validation has failed based on determining that the second validation response is invalid;
determine that the quantity of times is greater than or equal to a threshold; and
deny access to the second portion of the website based on determining that the quantity of times is greater than or equal to the threshold.
12. The non-transitory computer-readable medium of
block the client device from accessing the server device based on determining that the quantity of times is greater than or equal to the threshold, or
store, in a blacklist, information that identifies the client device based on determining that the quantity of times is greater than or equal to the threshold.
13. The non-transitory computer-readable medium of
a communication channel associated with providing text messages,
a communication channel associated with providing voice messages,
a communication channel associated with providing email messages,
a communication channel associated with providing instant messages,
a communication channel associated with providing chat messages, or
a communication channel associated with providing social media messages.
15. The method of
determining that the second validation response is valid; and
where performing the action comprises:
providing the first request to the second device based on determining that the second validation response is valid;
receiving a response to the first request from the second device; and
providing the response to the first device.
16. The method of
providing the first request to the second device before determining whether the second validation response is valid;
receiving a response to the first request from the second device before determining whether the second validation response is valid;
where determining whether the second validation response is valid comprises:
determining that the second validation response is valid; and
where performing the action comprises:
providing the second validation response to the first device based on determining that the second validation response is valid.
17. The method of
determining the sensitivity level based on information received from the second device.
18. The method of
determining that the second validation response is invalid; and
where performing the action comprises:
dropping the first request based on determining that the second validation response is invalid.
19. The method of
receiving, via the first communication channel, another request by the first device to access the second device,
the other request requesting access to another portion of the website;
determining another sensitivity level associated with the other request;
determining, based on the other sensitivity level and based on the other request requesting access to the other portion of the website, a fourth communication channel for validating the other request,
the fourth communication channel being different from the first communication channel, the second communication channel, and the third communication channel;
transmitting other validation information via the fourth communication channel;
receiving another validation response from the first device after transmitting the other validation information;
determining whether the other validation response is valid based on the other validation information and the other validation response; and
performing another action based on determining whether the other validation response is valid,
the other action comprising granting or denying access to the other portion of the website.
20. The method of
|
This application is a continuation of U.S. patent application Ser. No. 14/146,456, filed Jan. 2, 2014 (now U.S. Pat. No. 9,112,834), which is incorporated herein by reference.
A web browser running on a client device may become compromised by a malicious attack, such as a man-in-the-browser attack. A man-in-the-browser attack may take advantage of vulnerabilities in the web browser's security to modify web pages, modify transaction content, or insert transactions using the identity of the user. A man-in-the-browser attack may be difficult to detect by a user of the web browser or a host server with which the client device communicates. A hacker may use a man-in-the-browser attack to capture information to harm the user, such as by learning the user's credit card information and using the credit card information to make unauthorized purchases, learning the user's banking information and using the banking information to withdraw funds, or the like.
According to some possible implementations, a device may include one or more processors configured to: receive, from a client device, a request associated with a server device; determine a communication channel for validating the request; determine contact information for contacting a user, associated with the request, via the communication channel; provide validation information via the communication channel using the contact information; receive a validation response from the client device; determine, based on the validation information and the validation response, whether the validation response is valid; selectively perform a first action or a second action based on determining whether the validation response is valid, the first action being performed based on determining that the validation response is valid, the first action including providing a validation indicator, with the request, to the server device, the validation indicator instructing the server device to respond to the request; and the second action being performed based on determining that the validation response is not valid, the second action including providing an invalidation indicator, with the request, to the server device, the invalidation indicator instructing the server device to not respond to the request.
According to some possible implementations, a computer-readable medium may store one or more instructions that, when executed by one or more processors, cause the one or more processors to: receive, from a client device, a request associated with a user and intended for a server device, the request being sent via a browser of the client device; determine a message type for validating the request; determine contact information, for contacting the user, based on the message type; provide validation information via the message type and using the contact information; receive a validation response from the client device; determine, based on the validation information and the validation response, whether the validation response is valid; selectively perform a first action or a second action based on determining whether the validation response is valid, the first action being performed based on determining that the validation response is valid, the first action including providing a validation indicator, with the request, to the server device, the validation indicator instructing the server device to respond to the request; and the second action being performed based on determining that the validation response is not valid, the second action including providing an invalidation indicator, with the request, to the server device, the invalidation indicator instructing the server device to not respond to the request.
According to some possible implementations, a method may include: receiving, by one or more security devices and from a client device, a request for a resource; determining, by the one or more security devices, a communication channel for validating the request; determining, by the one or more security devices, contact information for contacting a user, associated with the request, via the communication channel; providing, by the one or more security devices, validation information via the communication channel using the contact information; receiving, by the one or more security devices, a validation response; determining, by the one or more security devices and based on the validation information and the validation response, whether the validation response is valid; selectively performing, by the one or more security devices, a first action or a second action based on determining whether the validation response is valid, the first action being performed based on determining that the validation response is valid, the first action including providing a validation indicator, with the request, to the server device, the validation indicator instructing the server device to provide the resource to the client device; and the second action being performed based on determining that the validation response is not valid, the second action including providing an invalidation indicator, with the request, to the server device, the invalidation indicator instructing the server device to not provide the resource to the client device.
The following detailed description of example implementations refers to the accompanying drawings. The same reference numbers in different drawings may identify the same or similar elements.
A user may use a web browser on a client device to interact with a webpage hosted by a server device. The client device and the server device may exchange messages based on the user interaction with the webpage. In some cases, the browser may be compromised by a malicious attack, such as a man-in-the-browser attack. A man-in-the-browser attack (or another malicious attack) may cause the client device and the server device to exchange messages, using the identity of the user (e.g., in a user's browser session), without the user's knowledge or permission. A hacker may use such an attack to gain access to sensitive user information (e.g., banking information, credit card information, etc.) or to perform unauthorized transactions (e.g., withdrawing money from a bank account). The server device may not be aware of such an attack because the attack issues requests in the user's browser during the user's browser session with the server device. Thus, the server device may treat the messages and/or transactions as valid and authorized. Implementations described herein may utilize a security device to protect against such attacks by validating a user using a communication channel other than a potentially compromised web browser.
The security device may receive the user's contact information (e.g., the user's phone number) from the server device, and may provide validation information to the user based on the contact information. For example, and as shown, the security device may receive a user's phone number from the server device, and may provide a validation code to the user's phone via a text message. Furthermore, the security device may provide a validation prompt to the client device, which may cause the client device to display a validation prompt for inputting the validation code.
As shown in
The security device may store the initial request, and may provide the validation indicator to the server device in a header of the request. In this way, the security device handles validation and protection of the server device. The validation indicator may indicate that the client device has been validated. Based on receiving the validation indicator, the server device may respond to the request (e.g., by sending a response to the client device, by performing a transaction requested by the client device, etc.). In this way, a user may be protected from malicious attacks because the server device may only respond to requests that have been validated, and a malicious attacker may not have access to the communication channel via which the validation information is sent.
Client device 210 may include one or more devices capable of receiving and/or providing information over a network (e.g., network 240), and/or capable of generating, storing, and/or processing information received and/or provided over the network. For example, client device 210 may include a computing device, such as a laptop computer, a tablet computer, a desktop computer, a mobile phone (e.g., a smart phone, a radiotelephone, etc.), or a similar device. Client device 210 may receive information from and/or provide information to server device 220 (e.g., via network 240 and/or security device 230). In some implementations, client device 210 may include a browser used to interact with server device 220, such as by sending requests (e.g., HTTP requests) to server device 220 and/or receiving responses (e.g., HTTP responses) from server device 220. In some implementations, requests from client device 210 may be processed by security device 230 before being sent to server device 220.
Server device 220 may include one or more devices capable of receiving and/or providing information over a network (e.g., network 240), and/or capable of generating, storing, and/or processing information received and/or provided over the network. For example, server device 220 may include a computing device, such as a server (e.g., an application server, a content server, a host server, a web server, etc.) or a similar device. Server device 220 may receive information from and/or provide information to client device 210 (e.g., via network 240 and/or security device 230). Server device 220 may respond to requests (e.g., requests for resources, transaction requests, etc.) received from client device 210. In some implementations, responses from server device 220 may be processed by security device 230 before being sent to client device 210.
Security device 230 may include one or more devices capable of processing and/or transferring traffic between client device 210 and server device 220. For example, security device 230 may include a network device, such as a reverse proxy, a server (e.g., a proxy server), a traffic transfer device, a gateway, a firewall, a router, a bridge, a hub, a switch, a load balancer, or the like. Security device 230 may be used in connection with a single server device 220 or a group of server devices 220 (e.g., a data center, a private network, etc.). Communications may be routed through security device 230 to reach the group of server devices 220. For example, security device 230 may be positioned within a network as a gateway to a private network that includes the group of server devices 220. Additionally, or alternatively, communications from client device 210 may be encoded such that the communications are routed to security device 230 before being routed to server device 220.
Network 240 may include one or more wired and/or wireless networks. For example, network 240 may include a wireless local area network (WLAN), a local area network (LAN), a wide area network (WAN), a metropolitan area network (MAN), a telephone network (e.g., the Public Switched Telephone Network (PSTN)), a cellular network, a public land mobile network (PLMN), an ad hoc network, an intranet, the Internet, a fiber optic-based network, or a combination of these or other types of networks.
The number of devices and networks shown in
Bus 310 may include a component that permits communication among the components of device 300. Processor 320 may include a processor (e.g., a central processing unit, a graphics processing unit, an accelerated processing unit), a microprocessor, and/or a processing component (e.g., a field-programmable gate array (FPGA), an application-specific integrated circuit (ASIC), etc.) that interprets and/or executes instructions. Memory 330 may include a random access memory (RAM), a read only memory (ROM), and/or another type of dynamic or static storage device (e.g., a flash, magnetic, or optical memory) that stores information and/or instructions for use by processor 320.
Input component 340 may include a component that permits a user to input information to device 300 (e.g., a touch screen display, a keyboard, a keypad, a mouse, a button, a switch, etc.). Output component 350 may include a component that outputs information from device 300 (e.g., a display, a speaker, one or more light-emitting diodes (LEDs), etc.).
Communication interface 360 may include a transceiver-like component, such as a transceiver and/or a separate receiver and transmitter, that enables device 300 to communicate with other devices, such as via a wired connection, a wireless connection, or a combination of wired and wireless connections. For example, communication interface 360 may include an Ethernet interface, an optical interface, a coaxial interface, an infrared interface, a radio frequency (RF) interface, a universal serial bus (USB) interface, a Wi-Fi interface, or the like.
Device 300 may perform one or more processes described herein. Device 300 may perform these processes in response to processor 320 executing software instructions included in a computer-readable medium, such as memory 330. A computer-readable medium may be defined as a non-transitory memory device. A memory device may include memory space within a single physical storage device or memory space spread across multiple physical storage devices.
Software instructions may be read into memory 330 from another computer-readable medium or from another device via communication interface 360. When executed, software instructions stored in memory 330 may cause processor 320 to perform one or more processes described herein. Additionally, or alternatively, hardwired circuitry may be used in place of or in combination with software instructions to perform one or more processes described herein. Thus, implementations described herein are not limited to any specific combination of hardware circuitry and software.
The number of components shown in
As shown in
As further shown in
Additionally, or alternatively, security device 230 may provide the request to server device 220, and server device 220 may determine to validate the request (e.g., based on contents, client device 210, server device 220, a user, a webpage, etc.). Based on determining to validate the request, server device 220 may provide, to security device 230, information indicating that the request is to be validated (e.g., a validation request indicator). For example, server device 220 may provide a response to security device 230 with a validation request indicator in the header, in the body, etc., of the response. In some implementations, the response from server device 220 may include a response to the request from client device 210, and the response may be stored by security device 230 until client device 210 is validated. Once security device 230 validates client device 210 (e.g., a user associated with client device 210), then security device 230 may provide the response to client device 210.
As further shown in
Security device 230 may determine the communication channel and the contact information based on a user associated with client device 210, in some implementations. For example, a user may provide login information, via client device 210, to log into a website hosted by server device 220. The login information may be associated with one or more communication channels for contacting the user and/or may be associated with contact information for contacting the user (e.g., using one or more different communication channels).
A communication channel may include a message type to be used to contact the user. For example, a communication channel may include a text message (e.g., a short message service (SMS) text message, a multimedia messaging service (MMS) text message, etc.), a voice message, an email message, an instant message, a chat message, a social media message, or the like. Contact information may include information that allows security device 230 to contact the user via the communication channel (e.g., by identifying an endpoint for a message). For example, contact information may include a phone number (e.g., for a text message, a voice message, etc.), an email address (e.g., for an email message), a user name (e.g., for an instant message, a chat message, a social media message, etc.), or the like.
In some implementations, security device 230 may determine a communication channel based on available contact information for a user. For example, if security device 230 has access to a user's email address, but not a user's phone number, then security device 230 may determine to provide validation information via an email message rather than a text message or a voice message. When multiple communication channels are available, security device 230 may determine a communication channel based on a stored preference, a type of request (e.g., a login request, a transaction request, etc.), a sensitivity level of the request (e.g., a type of information requested), an indication from server device 220 (e.g., based on code stored on server device 220), or the like. Additionally, or alternatively, security device 230 may randomly determine the communication channel to make evasion by an attacker more difficult. For example, security device 230 may receive information identifying a set of available communication channels (and/or contact information associated with those channels), and may randomly select a communication channel, of the set of available communication channels, to be used for validation.
Security device 230 may determine contact information based on a selected communication channel, in some implementations. For example, if security device 230 determines to provide validation information via a text message or a voice message, then security device 230 may determine a phone number for contacting the user. As another example, if security device 230 selects a particular social media service for providing the validation information, then security device 230 may determine a username of the user for that social media service.
In some implementations, security device 230 may store information for determining the communication channel and/or the contact information. For example, security device 230 may store code that instructs security device 230 to determine the communication channel and/or the contact information. Additionally, or alternatively, server device 220 may store information (e.g., code) for determining the communication channel and/or the contact information, and may provide information identifying the communication channel and/or contact information to security device 230. For example, server device 220 may provide a validation request indicator to security device 230, and the validation request indicator may include information that identifies the communication channel and/or the contact information to be used to validate the user.
As further shown in
Validation information may include a validation code, in some implementations. A validation code may include a string of characters used to validate a user. In some implementations, the validation code may include an RSA token. Additionally, or alternatively, validation information may include a validation challenge, such as a question to which the user may provide a response (e.g., “What is your middle name?”).
In some implementations, a user may interact with a website, and security device 230 may determine a communication channel (e.g., a message type), contact information, and/or a validation type (e.g., using a validation code, using a validation challenge, etc.) based on a sensitivity level of the interaction. For example, the user may attempt to log into a banking website (e.g., a less sensitive interaction), and security device 230 may send an email message with a validation code to the user's email address. Then, the user may attempt to transfer money from the user's bank account (e.g., a more sensitive interaction), and security device 230 may send an SMS message with a validation challenge (e.g., a security question) to the user's phone. In this way, the difficulty of validation may depend upon the sensitivity level of a user interaction (e.g., a type of transaction requested, a type of information requested, etc.). In other words, security device 230 may treat a more sensitive interaction using a more difficult validation technique than a less sensitive interaction.
As another example, security device 230 may use different validation techniques for user requests to access different portions of a website. For example, security device 230 may use a first validation technique (e.g., a voice message, with a validation code, via the user's phone) to grant or deny the user access to a first portion of the website, and may use a second validation technique (e.g., a social media message, with a validation challenge, via the user's social media account) to grant or deny the user access to a second portion of the website.
As further shown in
Security device 230 may provide the validation prompt based on the communication channel, the contact information, and/or the validation information, in some implementations. For example, if security device 230 provides a validation code via an SMS text message to a user's cell phone, then the validation prompt may indicate that the validation code was sent to the user's cell phone using an SMS text message, and may identify the cell phone number to which the validation code was sent.
The user may input a validation response via the validation prompt, and client device 210 may provide the validation response to security device 230 for validation. For example, security device 230 may provide, to a user's phone, a text message with a validation code. The user may receive the text message using the user's phone, and may input the validation code into a browser of client device 210 (e.g., using the validation prompt). As another example, security device 230 may provide, to a user's email address, a validation challenge asking the user to input the answer to a challenge question via the validation prompt. The user may receive the email (e.g., using client device 210 and/or another device), and may input a validation response to the validation challenge via the validation prompt. A validation response may refer to information input by a user using the validation prompt, such as a validation code, an answer to a validation challenge, or the like. The user may provide the validation response to security device 230 via client device 210 and/or another device (e.g., the user's phone, a different client device 210 than the one that sent the request, etc.). Security device 230 may receive information that identifies the validation response.
As further shown in
As further shown in
In some implementations, if security device 230 determines that the validation response is invalid, then security device 230 may return to block 415 to determine a communication channel (e.g., the same communication channel or a different communication channel) and/or contact information (e.g., the same contact information or different contact information) to be used to provide new validation information (e.g., the same validation information or different validation information) to the user. For example, a user may be given a threshold quantity of chances to input a validation response that is valid. Security device 230 may provide new validation information to the user based on whether the threshold has been satisfied.
As an example, security device 230 may use a first communication channel (e.g., an SMS message) and first contact information (e.g., a user's phone number) a first time that validation information is sent, and may use a second communication channel (e.g., an email message) and second contact information (e.g., a user's email address) a second time that validation information is sent. If validation fails a threshold quantity of times, then security device 230 may place the user and/or client device 210 on a blacklist (e.g., by storing information that identifies the user and/or client device 210), and may block the user and/or client device 210 from accessing server device 220.
In some implementations, security device 230 may receive information identifying the first communication channel, may receive the first contact information, may receive information identifying the second communication channel, may receive the second contact information, etc., from server device 220 based on transmitting the initial request to server device 220. In other words, security device 230 may receive information identifying multiple communication channels and may receive multiple items of contact information based on the initial request.
Additionally, or alternatively, security device 230 may receive information identifying the first communication channel and the first contact information from server device 220 based on the initial request. Security device 230 may then determine that the validation response is invalid, and may provide an invalidation indicator to server device 220. Based on providing the invalidation indicator, security device 230 may receive, from server device 220, information identifying the second communication channel and the second contact information. Security device 230 and server device 220 may continue to operate in this manner, determining a communication channel and contact information to be used for validation, until the user is validated or blocked.
As further shown in
Security device 230 may store the request (e.g., based on receiving an indication from server device 220 that the request is to be validated). Once security device 230 has validated the request, security device 230 may provide the validation indicator to server device 220 in a header of the request. In other words, security device 230 may reissue the request to server device 220 with a header that indicates that the request has been validated. In this way, security device 230 may handle the validation processing to protect server device 220 from malicious attacks.
As further shown in
Additionally, or alternatively, security device 230 may store the original response from server device 220 (e.g., the response provided along with the validation request indicator). In this case, security device 230 may provide the original response to client device 210 based on determining that the validation response is valid (e.g., without requesting the original response from server device 220 after validation).
Although
As shown in
As shown in
As shown in
As shown by reference number 524, security device 230 determines to send a new validation code to the user's email address. In some implementations, server device 220 may provide instructions to security device 230 indicating a quantity of attempts to give a user to provide a correct validation response (e.g., before locking the user out of the website). Additionally, or alternatively, server device 220 may provide information indicating different communication channels and/or contact information to be used when the user inputs an incorrect validation response. Server device 220 may provide this information to security device 230 upon receiving the initial request. Additionally, or alternatively, server device 220 may provide this information to security device 230 after the initial request and after one or more incorrect validation responses.
For the purpose of
As shown in
As shown by reference number 536, security device 230 may retransmit the original request from client device 210 to server device 220, and may include a header in the request that includes a validation indicator. For example, assume that the validation indicator is included in the header as X-Validation-Complete: True. Server device 220 receives the request, determines that the validation indicator is present in the request, and provides a response to the request. For example, as shown by reference number 538, server device 220 provides a “Login Successful” webpage, intended for client device 210, to security device 230. As shown by reference number 540, security device 230 provides the webpage to client device 210 for display via the browser. In this way, server device 220 and/or security device 230 may protect a user from malicious attacks (e.g., attempts to discover the user's banking information) by validating a user prior to permitting the user to access sensitive information.
The foregoing disclosure provides illustration and description, but is not intended to be exhaustive or to limit the implementations to the precise form disclosed. Modifications and variations are possible in light of the above disclosure or may be acquired from practice of the implementations.
As used herein, the term component is intended to be broadly construed as hardware, firmware, or a combination of hardware and software.
It will be apparent that systems and/or methods, as described herein, may be implemented in many different forms of software, firmware, and hardware in the implementations illustrated in the figures. The actual software code or specialized control hardware used to implement these systems and/or methods is not limiting of the implementations. Thus, the operation and behavior of the systems and/or methods were described without reference to the specific software code—it being understood that software and hardware can be designed to implement the systems and/or methods based on the description herein.
Some implementations are described herein as receiving information from a device or providing information to a device. These phrases may refer to receiving information directly from a device or providing information directly to a device, without the information being transferred via an intermediary device situated along a communication path between devices. Additionally, or alternatively, these phrases may refer to receiving information, provided by a device, via one or more intermediary devices (e.g., network devices), or providing information to a device via one or more intermediary devices.
Some implementations are described herein in connection with thresholds. As used herein, satisfying a threshold may refer to a value being greater than the threshold, more than the threshold, higher than the threshold, greater than or equal to the threshold, less than the threshold, fewer than the threshold, lower than the threshold, less than or equal to the threshold, equal to the threshold, etc.
Even though particular combinations of features are recited in the claims and/or disclosed in the specification, these combinations are not intended to limit the disclosure of possible implementations. In fact, many of these features may be combined in ways not specifically recited in the claims and/or disclosed in the specification. Although each dependent claim listed below may directly depend on only one claim, the disclosure of possible implementations includes each dependent claim in combination with every other claim in the claim set.
No element, act, or instruction used herein should be construed as critical or essential unless explicitly described as such. Also, as used herein, the articles “a” and “an” are intended to include one or more items, and may be used interchangeably with “one or more.” Furthermore, as used herein, the term “set” is intended to include one or more items, and may be used interchangeably with “one or more.” Where only one item is intended, the term “one” or similar language is used. Further, the phrase “based on” is intended to mean “based, at least in part, on” unless explicitly stated otherwise.
Adams, Kyle, Quinlan, Daniel J.
Patent | Priority | Assignee | Title |
11169713, | Oct 03 2019 | LANDIS+GYR TECHNOLOGY, INC | Restricting write cycles to extend the lifetime of nonvolatile memory |
Patent | Priority | Assignee | Title |
9112834, | Jan 02 2014 | Juniper Networks, Inc. | Protecting sensitive web transactions using a communication channel associated with a user |
20030177140, | |||
20040166832, | |||
20070266257, | |||
20090259848, | |||
20120297476, | |||
20130007849, | |||
20130132752, | |||
20130139231, | |||
20130333006, | |||
20140282919, | |||
20150087265, | |||
20150186664, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Oct 29 2013 | ADAMS, KYLE | Juniper Networks, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 036330 | /0306 | |
Dec 03 2013 | QUINLAN, DANIEL J | Juniper Networks, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 036330 | /0306 | |
Aug 14 2015 | Juniper Networks, Inc. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
May 10 2022 | REM: Maintenance Fee Reminder Mailed. |
Oct 24 2022 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Sep 18 2021 | 4 years fee payment window open |
Mar 18 2022 | 6 months grace period start (w surcharge) |
Sep 18 2022 | patent expiry (for year 4) |
Sep 18 2024 | 2 years to revive unintentionally abandoned end. (for year 4) |
Sep 18 2025 | 8 years fee payment window open |
Mar 18 2026 | 6 months grace period start (w surcharge) |
Sep 18 2026 | patent expiry (for year 8) |
Sep 18 2028 | 2 years to revive unintentionally abandoned end. (for year 8) |
Sep 18 2029 | 12 years fee payment window open |
Mar 18 2030 | 6 months grace period start (w surcharge) |
Sep 18 2030 | patent expiry (for year 12) |
Sep 18 2032 | 2 years to revive unintentionally abandoned end. (for year 12) |